Both automated and manual
vulnerability assessment will be performed - based on the information found
from the Profiling Phase - against the customer’s wireless infrastructure to
ensure that all known and unknown vulnerabilities will be identified.

Specifically, the following
vulnerability assessment techniques will be used:-

At
the exploitation stage we will try to exploit and validate the existence of the
identified vulnerabilities. Both online and offline password cracking
techniques (e.g. Guessing, Dictionary, Hybrid, Brute-force) will be performed
against password hashes (e.g. Pre-Shared Key) and/or authentication points
found from previous steps of testing. In case of successful exploitation we
will try to escalate privileges within applications, hosts and networks.